
Application System: Risks and Control Quiz
Authored by Mylene Quiros
History
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common risk associated with application systems?
Insufficient documentation for end users
Lack of user authentication mechanisms
Overabundance of data redundancy
Data concentration leading to increased reliance on a single piece of data
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common risk associated with ERP Enterprise Resource Planning systems?
Overemphasis on data decentralization
Lack of integration with other IT systems
Inadequate storage capacity for critical data
Processing errors impacting multiple functions due to shared information
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a preventative measure for erroneous data input in application systems?
Increasing the number of data repositories
Built-in application controls like check digits and double entry
Allowing open access to all users for data modification
Implementing weak information security measures
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential risk of unauthorized remote access to application systems?
Sensitive and confidential information being at risk
Enhanced data accuracy and integrity
Improved network performance
Decreased user productivity
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is insufficient documentation a risk for application systems?
It hinders effective analysis of program changes and troubleshooting
It increases data redundancy
It enhances user understanding of the system
It improves system maintainability
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common risk associated with inaccurate information in application systems?
Excessive data accuracy leading to confusion
Management failing to use information properly
Lack of user access to information
Overreliance on outdated data
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can organizations combat unauthorized remote access to application systems?
Using encryption for user IDs and passwords transmitted over public lines
Providing unrestricted access to all users
Allowing unencrypted transmission of confidential data
Avoiding user access reviews
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?